Research Journal of Applied Sciences, Engineering and Technology 9(10): 895-901,... ISSN: 2040-7459; e-ISSN: 2040-7467

advertisement
Research Journal of Applied Sciences, Engineering and Technology 9(10): 895-901, 2015
ISSN: 2040-7459; e-ISSN: 2040-7467
© Maxwell Scientific Organization, 2015
Submitted: December ‎14, ‎2014
Accepted: January ‎27, ‎2015
Published: April 05, 2015
Design of a Secure Smart Grid Architecture Model using Damgard Jurik Cryptosystem
K. Seethal, Divya M Menon and N. Radhika
Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
Abstract: Smart grid is a paradigm shift from the traditional Power grid which promises to make the electric grid
both energy efficient and Fault tolerant. Trade-off between Energy savings and Security is a critical issue in Smart
grid architecture. Smart grid architecture requires a high level secure data exchanges between sensors like Phasor
Measurement Units and Advanced Metering Infrastructures like Smart Meters. In this study a Secure Smart grid
Architecture model is proposed for the Smart grid network. Initially DamgardJurik encryption algorithm is applied
on the data from the Phasor Measurement Units and a digital signature is then attached to the encrypted text to
provide further authentication. The digitally signed data is collected in Data centre where it is decrypted. The
proposed architecture has been implemented in both software and hardware. The effectiveness of the system is
verified by introducing an intruder in hardware implementation.
Keywords: DamgardJurik scheme, digital signature, Phasor Measurement Unit (PMU), smart grid
of Smart grid network i.e., Power Generation, Power
Transmission and Power Distribution. Generation Phase
in a Smart grid System does not have any significant
change when compared to Power Grid. The major
concern for security arises at the communication
network deployed in Smart Grid. The Phasor
Measurement Units (PMUs) are measuring equipments
which functions as sensors in the Smart grid
communication network. PMUs require a Coordinated
Universal Time (UTC) which it receives from the
Global Positioning Satellites. Calibrating the time
discrepancies in PMUs is done by Distributed Time
Service (DTS). Coordinated Universal Time (UTC)
generates the voltage and current values. Data
exchanges between the PMUs and PDC that is the
central Data Centre require higher level of security.
Thus this study proposes a Secure Smart Grid
Architecture (SSGA) framework for Smart grid sensor
networks. In particular, this study introduces security
architecture between the distribution and transmission
side of Smart grid while balancing the energy
consumption. Further, detailed results are presented for
security measures adopted between the sensors and the
Data Centre. The major challenge is to ensure high
security with low energy consumption.
The architecture of Smart grid system with three
main modes of operations i.e., Power generation, Power
Transmission and Power Distribution is illustrated in
Fig. 1. This study concentrates on the security aspects
between the Transmission and Distribution side. Here
we have proposed a Secure Smart Grid Architecture
(SSGA) covering these two areas. The study is
organized in the following three sections as: In the
INTRODUCTION
Smart grid has evolved as a powerful replacement
for the traditional electrical power grid in the coming
years. As the need for Electricity increases so is the
need for efficient Power grids. Furthermore the design
of our traditional power grids is not able to meet the
increasing demands of suppliers. Hence we need a
smarter solution and that is Smart grid. The need for an
autonomous, self healing, reliable electric grid has
paved the way for Smartgrid (Rahimi and Ipakchi,
2010). Bidirectional Communication between Power
generation suppliers and end users, deployment of
efficient sensors throughout the network makes the grid
smarter.
Power requirement by the end users and efficient
energy distribution throughout the Smart grid is to be
managed by Advanced Metering Infrastructure (AMI),
without human intervention. Another main component
is the smart meter, which will help the customers to
reduce the energy costs and will automatically turnoff
devices when there is chance for outage.
Another inevitable part of Smart grid is the sensor
network, which consists of a network of sensor nodes
that have processing and routing capabilities of
information. A sensor network monitors the
performance of electronic equipments and generates
billing based on information from smart meters (Yan
et al., 2013).
Smart grid is the need of the century and hence
security is a major concern for the grid. While using
wireless transmission in Smart grid networks high level
of security need to be established at all the three stages
Corresponding Author: K. Seethal, Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham,
Coimbatore, India
895
Res. J. Appl. Sci. Eng. Technol., 9(10): 895-901, 2015
Fig. 1: Smart grid system
following Sections we have considered the related
works in security of Smart grid networks. And we have
described the mathematical background used in this
model. And also formulated the Secure Smart grid
Architecture (SSGA) model in Materials and Methods.
In Results and Discussions we have demonstrated the
results of both software and hardware implementation.
In last Section, we have concluded the paper and
provided directions for future research.
Smart grid is equipped with new technologies day
by day so there arises for security and privacy concerns.
It is so vulnerable and more prone to attacks (Chen
et al., 2012). So our concern is to provide security for
data between transmission and distribution side (Wei
et al., 2009). Fengjun Li, Bo Lu and Peng Liu proposed
(Li et al., 2010) a secure data aggregation model using
Paillier cryptosystem (Paillier and Pointcheval, 1999) in
Smart girds. They have articulated the secure
aggregation using a virtual tree based aggregation of
data. Ye Yan proposed a security protocol which deals
with the Advanced Metering Infrastructure in Smart
grid networks. They have proposed an Integrated
Authentication and Confidentiality (IAC) protocol
which integrates both authentication and confidentiality
for collecting data and messages in a secured way.
Wang and Yi (2011) have analyzed two problems by
creating a wireless mesh network and security
framework under this architecture. Within the network
an intrusion detection security firewall is built and the
network communication architecture is analyzed.
Nicanfar et al. (1999) articulated a mechanism that
utilizes the advances in network in network coding to
maintain data privacy in smart gird through which they
could ensure schemes for encryption and traffic routing.
We need a secure Smart grid system which provides
confidentiality and integrity of data. Therefore we have
implemented Secure Smart grid Architecture (SSGA)
which integrates both encryption and digital signature
to assure security in the Smart grid system between
transmission and distribution side. We used
DamgardJurik cryptosystem (Damgård and Jurik, 2001)
which provides additive property of homomorphic
encryption function.
MATERIALS AND METHODS
Here we discuss the mathematical background of
algorithms used in SSGA model. The main focus is on
DamgardJurik scheme (Damgård and Jurik, 2001) for
encrypting the phasor values. In our Smart grid system
we need to aggregate all the Phasor Measurement Unit
(PMU) values and hence our focus is on homomorphic
encryption. This algorithm uses the property of additive
homomorphism. After applying encryption we are
applying RSA Digital Signature Algorithm to the data
for authenticity.
DamgardJurik encryption scheme:
Definition: Let (M, o) be the message space.
DamgardJurik scheme on M is a quadruple (K g , E p , D c ,
A) which satisfies the following conditions.
Steps involved in key generation: For an input
message DamgardJurik scheme K g will generate a key
pair {k1, k2} where k1→ (n, g) and k2→d:
•
•
•
•
•
896
Randomly select two prime numbers p and r which
are independent
Obtain the values for n and λ, where n = pr and
λ = lcm (p-1, r-1)
Choose g = (1+n)j x mod n(s+1), for all g ϵ Z * n (s+1)
Choose b using Chinese remainder theorem where
it should satisfies the conditions b mod n ϵ Z* n and
b = 0 mod λ
Res. J. Appl. Sci. Eng. Technol., 9(10): 895-901, 2015
Fig. 2: Layered architecture of secure smart grid architecture
Steps involved in encryption: Choose a random
number t, where t ϵ Z * n (s+1)
Derive the cipher text c, where, c = gm. tn s mod n (s+1)
Communication Layer which provides secure data
transmission between the physical components through
security algorithms. Layer 3 represents the Application
Layer which manages the information in the data centre
for user specific application.
Here we consider a Secure Smart grid Architecture
model in which there are a number of PMUs attached to
the transmission station. PMUs collect all the Phasor
Measurement values and will transmit it to the
Distribution Controller i.e., Data centre at the
Distribution side. Our model encrypts all the PMU
values before sending to the Data centre using
DamgardJurik Encryption Algorithm. For providing
further authenticity the encrypted data is again digitally
signed using a RSA Digital Signature Algorithm.
Every PMU holds a database for storing voltage
and current values Each Pmu will be having values in
the format Pname*V*V a *I*I a *F# which it periodically
transmits to Data centre. P name defines the PMU name.
V, I, V a , I a represents the voltage, current values and
their angles, respectively. F denotes the frequency. Here
every PMU data is separated using #.
Steps involved in decryption: Compute cb mod n(s+1) to
obtain plain text.
Digital signature: Digital signature is an authentication
for a digital message or document. RSA digital
signature validates the PMU.
Sending process: Create a hash value of the message.
Use private key pair (n, d) to generate the signature.
S = Md mod n.
Sends S to the receiver.
Signature verification: The receiver uses public key
pair (n, e) to obtain the hash value
R = Se mod n
Generate the hash value from the sender’s message
Checks for both hash value
If both values are identical then data will be valid.
Procedure for SSGA software implementation:
1. Read values from serial port.
2. Check for # value.
3. While # do
Read the PMU Name
Choose the DB table corresponding to PMU
name
Insert I and V values to the Database
4. End While
5. For all PMU value in DB table do
Apply DamgardJurik Encryption Algorithm
6. End for
7. Apply RSA Digital Signature Algorithm for the
cipher text
8. end
PROPOSED FRAMEWORK FOR SSGA
Typically any Smart grid application requires a
secure network model for data transmission. The
component of this Secure Smart Grid Architecture
(SSGA) framework includes a Smart grid Generation
Unit, Smart grid Distribution Centre and Transmission
Centre. This architecture proposes a new level of
security between transmission and distribution of Smart
grid system. Therefore we focus on a multi security
system to provide secure data transmission.
Figure 2 depicts a layered visualization of Secure
Smart grid Architecture model (SSGA). Layer 1 is the
Physicallayer
which
represents
the
physical
components involved in SSGA. Layer 2 is the Secure
897
Res. J. Appl. Sci. Eng. Technol., 9(10): 895-901, 2015
Fig. 3: GUI of secure smart grid architecture
Fig. 4: GUI of web application of secure smart grid architecture
corresponding database is to be entered. From the GUI
itself one will be able to get the database value.
In our SSGA two options for data storage is
implemented both in database and in website. A
database application and a web application is created to
store these PMU values.
The Web Application is shown in Fig. 4 where the
voltage and current values are stored in web. The Web
Application allows the values to be stored in web.
Administrators can monitor the performance of the
Smart grid by constantly monitoring the PMU Values.
RESULTS AND DISCUSSION
A raw electric system has been made more users
friendly by providing a user interface and efficient ways
to access data from different PMUs. Figure 3 shows the
GUI of Secure Smart Grid Architecture. In the
architectural GUI we have placed bus buttons which are
attached to databases. Whenever values are transmitted
from the Smart grid system it will be stored in the
corresponding database. It identifies the name of the
PMU from the data format and data to the
898
Res. J. Appl. Sci. Eng. Technol., 9(10): 895-901, 2015
Fig. 5: Implementation of DamgardJurik Encryption
At the Data centre these values are decrypted and the
frequency value which controls the Smart grid system is
returned to the PMU. The control variable from the
datacenter is also stored in this application for
performance analysis of the Smart grid System. Since it
is decrypted using homomorphic function cipher text
can be used for other operations without revealing the
actual plain text. DamgardJurik scheme uses additive
property of homomorphic function.
The SSGA framework and its methodology are
implemented using DamgardJurik encryption algorithm
and digital signature algorithm. DamgardJurik
algorithm is an additive homomorphic encryption
algorithm which ensures the privacy of encrypted data.
This scheme works well on encrypted data while
maintaining the confidentiality of data. The first step of
our approach is to encrypt the phasor values using
DamgardJurik scheme. Figure 5 shows the stored
values in the PMUs are encrypted using DamgardJurik
Encryption Algorithm.
The sender uses a one way hash function to
calculate the message digest and uses its own private
key to sign the document. The receiver verifies the
signed document with the sender’s public key. Since
the public exponent in the RSA algorithm is smaller
than the private exponent, faster signature verification
is done. Figure 6 shows the verification of digital
signature at the data centre.
Implementation of any encryption algorithms
always gains significance when we provide hardware
implementation for the algorithm. Speed is a major
drawback when running time critical software
implementation.
An
alternative
is
hardware
implementation of encryption algorithms, since
provides speed along with secrecy of the encryption.
In our Secure Smart Grid Architecture (SSGA)
framework we are collecting all the Phasor
Measurement Unit values attached to the transmission
system. PMU is a phasor measurement unit attached to
Smart grid system which measures voltage and current
values periodically. These PMU values are encrypted
using DamgardJurik encryption algorithm. For a higher
level of security we are applying digital signature
algorithm for the encrypted values. A number of PMUs
are connected to each other. Each Pmu will be having
values in the format P name *V*V a *I*I a *F# which it
periodically transmits to Data centre. P name defines the
PMU name. V, I, V a , I a represents the
voltage,899current values and their angles respectively.
F denotes the frequency. Encryption is done for these
values at the sender side (i.e., in PMU) and they are
digitally signed before transmitting to the Data Centre.
At the receiving side these values are decrypted
and the frequency value is used for controlling the
Smart grid system. Depending on frequency values
transmitted from each PMU a control variable is
transmitted from the data centre back to PMU.
dsPIC30F4011 a high-Performance, 16-Bit Digital
Signal Controller is used for our hardware
implementation of the PMU which operates at speed
29.49MHz. This microcontroller is programmed for
encrypting the data using DamgardJurik encryption
algorithm and the data is transmitted to PIC16F877A.
Figure 7 shows the hardware schematic where the 16
bit microcontroller encrypts the data and transmit it to
the datacenter. Zigbee module is used for the wireless
transmission between the PMUs and Data centre. We
have introduced an intruder PC which checks the
security of the SSGA model.
899
Res. J. Appl. Sci. Eng. Technol., 9(10): 895-901, 2015
Fig. 6: Digital signature verification
Fig. 7: Hardware schematic for single PMU
The reliability of the implementation has been checked
with an intruder. In our future work, we will employ
Cloud storage for the Data. In the long term we will
also develop a more holistic security model covering
the generation and distribution as well.
CONCLUSION
Security has become a major concern in Smart grid
networks. In this study a Secure Smart Grid
Architecture model (SSGA) was proposed for Smart
grid networks. The security framework for this
architecture is expected to satisfy the security
requirements between the transmission and distribution
side in the Smart grid network. We have applied
DamgardJurik encryption algorithm for providing data
security. To further provide additional security the
encrypted data is again digitally signed using RSA
Digital Signature and finally transmitted to the Data
centre where it’s decrypted. We have carried out both
software and hardware implementations of this model.
REFERENCES
Chen, P.Y., S.M. Cheng and K.C. Chen, 2012. Smart
attacks in smart grid communication networks.
IEEE Communi. Magaz., 50(8): 24-29.
Damgård, I. and M. Jurik, 2001. A Generalisation, a
Simplification and Some Applications of Paillier's
Probabilistic Public-Key System. Public Key
Cryptography, pp: 119-136.
900
Res. J. Appl. Sci. Eng. Technol., 9(10): 895-901, 2015
Rahimi, F. and A. Ipakchi, 2010. Demand response as a
market resource under the smart grid paradigm.
IEEE T. Smart Grid, 1(1): 82-88.
Wang, X. and P. Yi, 2011. Security framework for
wireless communications in smart distribution grid.
IEEE T. Smart Grid, 2(4): 702-706.
Wei, X., Z. Yu-Hui and Z. Jie-Lin, 2009. Energyefficient distribution in smart grid in sustainable
power generation and supply. Proceeding of
International Conference on SUPERGEN’09, pp:
1-6.
Yan, Y., R.Q. Hu, S.K. Das and H. Sharif, 2013. An
efficient security protocol for advanced metering
infrastructure in smart grid. IEEE Network, 27(4):
64-71.
Li, F., B. Luo and P. Liu, 2010. Secure information
aggregation for smart grids using homomorphic
encryption. Proceeding of 1st IEEE International
Conference on Smart Grid Communications
(SmartGridComm), pp: 327-332.
Nicanfar, H., P. Talebifard, A. Alasaad and V.C.M.
Leung, 2013. Enhanced network coding to
maintain privacy in smart grid communication.
IEEE T. Emerg. Topics Comput., 1(2): 286-296.
Paillier, P. and D. Pointcheval, 1999. Efficient publickey cryptosystems provably secure against active
adversaries. In: Lam, K.Y., E. Okamoto and C.
Xing (Eds.): ASIACRYPT’99, LNCS 1716,
Springer-Verlag Berlin Heidelberg, pp: 165-179.
901
Download